Keyphrases
Privacy Leakage
100%
HIPAA Privacy Rule
100%
Forensic Tools
100%
Log Analysis
100%
HIPAA
100%
Insider Threat
100%
Health Social Network
100%
Augmentation Approach
100%
Authorization Framework
100%
Patient Data Privacy
100%
Deception Technology
100%
HIPPA
66%
MedHelp
66%
Re-identification
66%
Healthcare Entities
66%
Query-based
50%
Datalog
50%
Data Mining Engine
50%
Web Attacks
50%
Access Controller
50%
Authorized Users
50%
Detection Theory
50%
Patient Privacy
50%
Audit Trail
50%
Health Security
50%
Anomaly Detector
50%
Past Behavior
50%
Item Response Theory
50%
Hybrid Cyber-attack
50%
Deception Techniques
50%
Left behind
33%
Privacy Leak
33%
Quantitative Estimation
33%
Re-identification Attack
33%
Compliancy
33%
Risk Threshold
33%
Disclosure Decision
33%
Disclosure Rules
33%
Enforcement Mechanisms
33%
Privacy Control
33%
Privacy Preferences
33%
Privacy Disclosure
33%
Corrective Measures
33%
Privacy Protection
33%
Dynamic Configuration
33%
Privacy Rules
33%
Re-identification Risk
33%
Access Privacy
33%
Augmentation Algorithm
33%
Proposed Policy
33%
Computer Science
Authorization Framework
100%
Log Analysis
100%
Forensics Tool
100%
Privacy Leakage
100%
Privacy Breach
100%
Data Privacy
100%
Insider Threat
100%
Deception Technology
100%
Reidentification
80%
Privacy Control
50%
Access Control Rule
50%
Privacy Preference
50%
Security Product
50%
Privacy Protection
50%
Health Insurance Portability and Accountability Act
50%
Architectural Model
50%
Disclosure Privacy
50%
Actual Practice
50%
Querying Big Data
50%
Anomaly Detector
50%
Authorized User
50%
Response Theory
50%
Information Access
50%
Signal Structure
25%
Generalized Model
25%
Social Community
20%
Bayesian Networks
20%